Russian | English |
абонентское шифрование в сети | end-to-end encipherment |
автономное обнаружение попыток вторжения в сеть | host-based intrusion detection (by monitoring activity on individual hosts or devices within the network) |
автономное предотвращение попыток вторжения в сеть | host intrusion prevention (Protecting individual hosts or devices, such as servers, workstations, and other endpoints within a network, involves safeguarding them from potential threats, unauthorized access, and malicious activities. This is achieved by monitoring and controlling activities on a host, preventing intrusions and attacks through the detection and blocking of suspicious or malicious behavior Alex_Odeychuk) |
администратор защиты информации в компьютерных сетях | network defender (bleepingcomputer.com Alex_Odeychuk) |
активное наблюдение с целью перехвата информации в сетях операторов связи | active surveillance attacks through telecoms operators (Alex_Odeychuk) |
аппаратные и программные средства управления доступом одной сети в другую | firewall |
безопасность в сетях мобильной связи | mobile security (Alex_Odeychuk) |
безопасность в сетях мобильной связи | mobile network security (Alex_Odeychuk) |
безопасность работы в компьютерных сетях | network security (из кн.: Шаньгин В.Ф. Защита информации в компьютерных системах и сетях Alex_Odeychuk) |
... в информационно-телекоммуникационных сетях | cyber (Alex_Odeychuk) |
вредоносная деятельность в компьютерных сетях | malicious cyber activities (theguardian.com Alex_Odeychuk) |
группа по оперативному проникновению в компьютерные сети противника | tailored access operations group (New York Times Alex_Odeychuk) |
защита информации в компьютерных системах и сетях | cybersecurity (русс. термин из кн.: Шаньгин В.Ф. Защита информации в компьютерных системах и сетях, 2001 Alex_Odeychuk) |
информационная безопасность в компьютерных сетях | network security (forbes.com Alex_Odeychuk) |
информационная безопасность в компьютерных сетях | cyber security (Alex_Odeychuk) |
кадровый голод в отрасли информационной безопасности в компьютерных сетях | cybersecurity labor shortage (keyfactor.com Alex_Odeychuk) |
канальное шифрование в сети | link-by-link encryption |
картина угроз информационной безопасности в компьютерных сетях | cybersecurity threat landscape (the ever-evolving set of risks, vulnerabilities, and potential attacks that organizations face in the digital realm. It encompasses various types of threats, such as malware, ransomware, phishing, and advanced persistent threats, as well as emerging trends and technologies that could impact the security posture of organizations and their digital assets Alex_Odeychuk) |
механизм распределения вызовов в сети | Network Call Distributor |
незаконное контролирование обмена в сети | illegal network monitor |
несанкционированное контролирование обмена в сети | illegal network monitor |
обеспечение информационной безопасности в компьютерных сетях | cybersecurity protection (Alex_Odeychuk) |
обнаружение попыток вторжения в сеть | network intrusion detection (the process of monitoring and analyzing network traffic to identify and prevent unauthorized access, misuse, or attacks on a computer network Alex_Odeychuk) |
осуществлять активное наблюдение с целью перехвата информации в сетях операторов связи | route active surveillance attacks through telecoms operators (Alex_Odeychuk) |
пассивное наблюдение с целью перехвата информации в сетях операторов связи | surveillance attacks through telecoms operators (Alex_Odeychuk) |
система автономного обнаружения попыток вторжения в сеть | host-based intrusion detection system (software for monitoring activity on individual hosts or devices within the network in order to identify and prevent unauthorized access, misuse, or attacks on a computer network Alex_Odeychuk) |
система автономного предотвращения попыток вторжения в сеть | host intrusion prevention system (a security solution designed to protect individual hosts or devices, such as servers, workstations, and other endpoints within a network, from potential threats, unauthorized access, and malicious activities by monitoring and controlling activities on the host, preventing intrusions and attacks through the detection and blocking of suspicious or malicious behavior Alex_Odeychuk) |
система обнаружения вторжений в сеть | network intrusion detection system |
система обнаружения попыток вторжения в сеть | network intrusion detection system (specialized software designed to detect suspicious activity, potential threats, and intrusions in real-time, helping to safeguard an organization's network infrastructure and resources Alex_Odeychuk) |
система предотвращения попыток вторжения в сеть | network intrusion prevention system (A security solution designed to safeguard an organization's network from potential threats, unauthorized access, and malicious activities. It actively monitors, analyzes, and controls network traffic in real-time. By detecting and blocking suspicious or malicious behavior, it prevents intrusions and attacks from causing harm to the network or its resources before they have the chance to inflict damage Alex_Odeychuk) |
система управления доступом в сеть | network access control system |
сквозное шифрование в сети | end-to-end encipherment |
устройство обнаружения и предотвращения попыток проникновения в сеть | network intrusion detection and prevention device (a security solution that combines the functionalities of both detection and prevention systems to protect a network from potential threats and attacks. It actively monitors, analyzes, and controls network traffic in real-time, identifying and blocking suspicious or malicious activities to safeguard the network and its resources Alex_Odeychuk) |
уязвимость с точки зрения информационной безопасности в компьютерных сетях | cybersecurity vulnerability (adacore.com Alex_Odeychuk) |
эксперт по безопасности в сетях мобильной связи | mobile network security expert (Alex_Odeychuk) |
эксперт по информационной безопасности в компьютерных сетях | cybersecurity expert (Alex_Odeychuk) |